Filter
Chapter

Search results

  • 1992

    An illustrated mathematical foundation for ERA

    Johnson, M., Dampney, C. & Monro, G. P., 1992, The unified computation laboratory: modelling, specifications, and tools. Rattray, C. & Clark, R. G. (eds.). Oxford University Press, p. 77-84

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Linear term rewriting systems are higher dimensional string rewriting systems

    Johnson, M., 1992, The Unified Computation Laboratory: Modelling, Specifications, and Tools. Rattray, C. & Clark, R. G. (eds.). Oxford: Oxford University Press, p. 101-110 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 1993

    Taming large complex information systems

    Dampney, C. N. G. & Johnson, M. S. J., 1993, Complex Systems: From Biology to Computation. Green, D. & Bossomaier, T. (eds.). IOS Press, p. 210-222 13 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 1994

    On the value of commutative diagrams in information modelling

    Johnson, M. & Dampney, C. N. G., 1994, Algebraic Methodology and Software Technology. Nivat, M., Rattray, C., Rus, T. & Scollo, G. (eds.). London: Springer, Springer Nature, p. 45-58 14 p. (Workshops in Computing).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 1998

    Modelling inertia in action languages

    Prokopenko, M. & Peppas, P., 1998, Learning and Reasoning with Complex Representations: PRICAI'96 Workshops on Reasoning with Incomplete and Changing Information and on Inducing Complex Representations Cairns, Australia, August 26–30, 1996 Selected Papers. Antoniou, G., Ghose, A. K. & Truszczyński, M. (eds.). Berlin: Springer, Springer Nature, p. 234-247 14 p. (Lecture Notes in Computer Science; vol. 1359).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • New results on multi-receiver authentication codes

    Safavi-Naini, R. & Wang, H., 1998, Advances in Cryptology — EUROCRYPT 1998: International Conference on the Theory and Application of Cryptographic Techniques Espoo, Finland, May 31 – June 4, 1998 Proceedings. Nyberg, K. (ed.). Berlin: Springer, Springer Nature, Vol. 1403. p. 527-541 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1403).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    50 Citations (Scopus)
  • On the ádám conjecture on circulant graphs

    Mans, B., Pappalardi, F. & Shparlinski, I., 1998, Computing and Combinatorics: 4th Annual International Conference COCOON’98 Taipei, Taiwan, R.o.C., August 12–14, 1998 Proceedings. Hsu, W-L. & Kao, M-Y. (eds.). Berlin: Springer, Springer Nature, p. 251-260 10 p. (Lecture Notes in Computer Science; vol. 1449).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Citations (Scopus)
  • Querying clocked databases

    Orgun, M. A. & Liu, C., 1998, Flexible Query Answering Systems: Third International Conference, FQAS'98 Roskilde, Denmark, May 13–15, 1998 Proceedings. Andreasen, T., Christiansen, H. & Larsen, H. L. (eds.). Berlin: Springer, Springer Nature, Vol. 1495. p. 308-319 12 p. (Lecture Notes in Computer Science; vol. 1495).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • 1999

    Abduction without minimality

    Nayak, A. C. & Foo, N. Y., 1999, Advanced Topics in Artificial Intelligence: 12th Australian Joint Conference on Artificial Intelligence, AI’99 Sydney, Australia, December 6–10, 1999 Proceedings. Foo, N. (ed.). Berlin: Springer, Springer Nature, p. 365-377 13 p. (Lecture Notes in Computer Science; vol. 1747).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Citations (Scopus)
  • Broadcast authentication in group communication

    Safavi-Naini, R. & Wang, H., 1999, Advances in Cryptology - ASIACRYPT’99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999. Proceedings. Lam, K-Y., Okamoto, E. & Xing, C. (eds.). Berlin: Springer, Springer Nature, Vol. 1716. p. 1-14 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1716).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    6 Citations (Scopus)
  • Causal propagation semantics—a study

    Prokopenko, M., Pagnucco, M., Peppas, P. & Nayak, A., 1999, Advanced Topics in Artificial Intelligence: 12th Australian Joint Conference on Artificial Intelligence, AI’99 Sydney, Australia, December 6–10, 1999 Proceedings. Foo, N. (ed.). Berlin: Springer, Springer Nature, p. 378-392 15 p. (Lecture Notes in Computer Science; vol. 1747).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    3 Citations (Scopus)
  • Changing thresholds in the absence of secure channels

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R. & Wang, H., 1999, Information Security and Privacy: 4th Australasian Conference, ACISP’99 Wollongong, NSW, Australia, April 7–9, 1999 Proceedings. Pieprzyk, J., Safavi-Naini, R. & Seberry, J. (eds.). Berlin: Springer, Springer Nature, p. 177-191 15 p. (Lecture Notes in Computer Science; vol. 1587).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    30 Citations (Scopus)
  • Constructing elements of large order in finite fields

    Von Zur Gathen, J. & Shparlinski, I., 1999, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 13th International Symposium, AAECC-13 Honolulu, Hawaii, USA, November 15–19, 1999 Proceedings. Fossorier, M., Imai, H., Lin, S. & Poli, A. (eds.). Berlin: Springer, Springer Nature, Vol. 1719. p. 404-409 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1719).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    11 Citations (Scopus)
  • Modelling and reasoning about multi-dimensional information

    Orgun, M. A., 1999, Foundations of Intelligent Systems: 11th International Symposium, ISMIS’99 Warsaw, Poland, June 8–11, 1999 Proceedings. Raś, Z. W. & Skowron, A. (eds.). Berlin: Springer, Springer Nature, p. 484-493 10 p. (Lecture Notes in Computer Science; vol. 1609).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • On the computational hardness of testing square-freeness of sparse polynomials

    Karpinski, M. & Shparlinski, I., 1999, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes - 13th International Symposium, AAECC-13, Proceedings: 13th International Symposium, AAECC-13 Honolulu, Hawaii, USA, November 15–19, 1999 Proceedings. Fossorier, M., Imai, H., Lin, S. & Poli, A. (eds.). Berlin: Springer, Springer Nature, p. 492-497 6 p. (Lecture Notes in Computer Science; vol. 1719).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    10 Citations (Scopus)
  • 2000

    Applied hidden periodicity analysis for mining discrete-valued time series databases

    Lin, W. & Orgun, M., 2000, Intensional Programming II: Based on the Papers at ISLIP'99. Gergatsoulis, M. & Rondogiannis, P. (eds.). Singapore: World Scientific Publishing, p. 182-196 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Statistical queries on historical relational databases

    Maung, W., Swe, C. & Orgun, M. A., 2000, Intensional Programming II: Based on the Papers at ISLIP'99. Gergatsoulis, M. & Rondogiannis, P. (eds.). Singapore: World Scientific Publishing, p. 214-228 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • System Dynamics in Information Systems Analysis: An Evaluation Case Study

    Campbell, B., 2000, Systems Modeling for Business Process Improvement. Bustard, D., Kawalek, P. & Norris, M. (eds.). Norwood, USA: Artech House, p. 33-46 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 2001

    Competitive Collaboration in Australia's Pharmaceutical Industry

    More, E. & McGrath, M., 2001, The Internet and Health Communication: Experiences and Expectations. Rice, R. E. & Katz, J. E. (eds.). Thousand Oaks, USA: SAGE Publications, p. 329-350 22 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Multimedia copyright protection

    Pieprzyk, J., 2001, Design and management of multimedia information systems: opportunities and challenges. Rahman, S. M. (ed.). Hershey, PA.: IDEA GROUP PUBLISHING, p. 435-451 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • RBAC for XML document stores

    Hitchens, M. & Varadharajan, V., 2001, Information and Communications Security: Third International Conference, ICICS 2001 Xian, China, November 13-16, 2001 Proceedings. Qing, S., Okamoto, T. & Zhou, J. (eds.). Berlin: Springer, Springer Nature, Vol. 2229. p. 131-143 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2229).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    8 Citations (Scopus)
  • Reengineering the Healthcare Supply Chain in Australia: The PeCC Initiative

    More, E. & McGrath, M., 2001, Strategies for Healthcare Information Systems. Stegwee, R. & Spil, T. (eds.). Hershey, PA: IDEA GROUP PUBLISHING, p. 126-141 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 2002

    Distributed Authorization: principles and practice

    Varadharajan, V., 2002, Coding Theory and Cryptology. Niederreiter, H. (ed.). Singapore: Singapore University Press, p. 385-432 48 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Exponential sums in coding theory, cryptology and algorithms

    Shparlinski, I. E., 2002, Coding theory and cryptology. Niederreiter, H. (ed.). Singapore: World Scientific ; Singapore University Press, p. 323-384 62 p. (Lecture notes series, Institute for Mathematical Sciences, National University of Singapore).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Formal proofs for the security of signcryption

    Baek, J., Steinfeld, R. & Zheng, Y., 2002, Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems - Proceedings. Naccache, D. & Paillier, P. (eds.). Berlin; Heidelberg: Springer, Springer Nature, Vol. 2274. p. 80-98 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    174 Citations (Scopus)
  • Process Model for Round-Trip Engineering with Relational Database

    Maciaszek, L., 2002, Successful Software Reenigineering. S. Valenti (ed.). Hershey, USA: IRM Press, p. 76-91 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Ripple Down Rules: a technique for acquiring knowledge

    Richards, D., 2002, Decision Making Support Systems: achievements, trends and challenges for the new decade. Mora, M., Forgionne, G. A. & Gupta, J. N. D. (eds.). Hershey, USA: IDEA GROUP PUBLISHING, p. 207-226 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Selective forgery of rsa signatures with fixed-pattern padding

    Lenstra, A. K. & Shparlinski, I. E., 2002, Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12–14, 2002 Proceedings. Naccache, D. & Paillier, P. (eds.). Berlin: Springer, Springer Nature, Vol. 2274. p. 228-236 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Citations (Scopus)
  • Tacit knowledge acquisition and processing within the computing domain: An exploratory study

    Busch, P., 2002, Optimal Information Modelling Technique. van Slooten, K. (ed.). Hershey, PA: IRM Press, p. 121-127 7 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Visual Parallel Programming

    Zhang, K., Cai, W., Stankovic, N. & Orgun, M., 2002, Handbook of Software Engineering and Knowledge Engineering,: Vol.2 : Emerging Technologies. Chang, S. K. (ed.). Singapore: World Scientific Publishing, Vol. 2. p. 103-129 27 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    11 Citations (Scopus)
  • 2003

    Alignment-Based Learning versus Data-Oriented Parsing

    van Zaanen, M., 2003, Data-Oriented Parsing. Chicago, USA: University of Chicago Press, p. 385-403 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Digital Cash

    Mu, Y., Varadharajan, V. & Nguyen, K. Q., 2003, Payment Technologies for E-Commerce. Weidong Kou (ed.). Heidelberg, Germany: Springer, Springer Nature, p. 171-194 24 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Role-based access control and the access control matrix

    Saunders, G., Hitchens, M. & Varadharajan, V., 2003, Information and communications security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings. Qing, S., Gollmann, D. & Zhou, J. (eds.). Heidelberg, Germany: Springer, Springer Nature, p. 145-157 13 p. (Lecture notes in computer science; vol. 2836).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • 2004

    Composing web services using an agent factory

    Richards, D., van Splunter, S., Brazier, F. M. T. & Sabou, M., 2004, Extending Web services technologies: the use of multi-agent approaches. Cavedon, L. & Benatallah, B. (eds.). New York: Springer, Springer Nature, p. 229-251 23 p. (Multiagent systems, artificial societies, and simulated organizations; vol. 13).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Predicting subset sum pseudorandom generators

    Von Gathen, J. Z. & Shparlinski, I. E., 2004, Selected areas in cryptography: 11th InternationalWorkshop, SAC 2004 Waterloo, Canada, August 9-10, 2004, Revised Selected Papers. Handschuh, H. & Hasan, M. A. (eds.). Berlin: Springer, Springer Nature, p. 241-251 11 p. (Lecture notes in computer science; vol. 3357).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Citations (Scopus)
  • Question answering in terminology-rich technical domains

    Rinaldi, F., Hess, M., Dowdall, J., Mollá, D. & Schwitter, R., 2004, New directions in question answering. Menlo Park, CA: Association for the Advancement of Artificial Intelligence, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Structural pattern discovery in time series database

    Lin, W., Orgun, M. A. & Williams, G. J., 2004, Computational intelligence in economics and finance. Chen, S-H., Wang, P. P. & Kuo, T-W. (eds.). New York: Springer, Springer Nature, p. 262-287 26 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 2006

    Ad-hoc and personal ontologies: a prototyping approach to ontology engineering

    Richards, D., 2006, Advances in knowledge acquisition and management: Pacific Rim Knowledge Acquisition Workshop, PKAW 2006, Guilin, China, August 7-8, 2006 : revised selected papers. Berlin, Germany: Springer, Springer Nature, Vol. 4303 LNAI. p. 13-24 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4303 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    5 Citations (Scopus)
  • Algebraic background

    Doche, C. & Lubicz, D., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Boco Raton, Florida, USA: CRC Press, Taylor & Francis Group, p. 19-37 19 p. (Discrete mathematics and its applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Arithmetic of elliptic curves

    Doche, C. & Lange, T., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Boca Raton, Florida, USA: CRC Press, Taylor & Francis Group, p. 267-302 36 p. (Discrete mathematics and its applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    13 Citations (Scopus)
  • Arithmetic of special curves

    Doche, C. & Lange, T., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Boca Raton, Florida, USA: CRC Press, Taylor & Francis Group, p. 355-387 33 p. (Discrete mathematics and its applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Citations (Scopus)
  • Capturing and reusing rationale associated with requirements engineering process improvement: A case study

    Palyagar, B. & Richards, D., 2006, Rationale Management in Software Engineering. Dutoit, A. H., McCall, R., Mistrik, I. & Paech, B. (eds.). Berlin: Springer, Springer Nature, p. 391-408 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Citations (Scopus)
  • Computational grammatical inference

    Adriaans, P. W. & van Zaanen, M. M., 2006, Innovations in machine learning: theory and applications. Berlin, Germany: Springer, Springer Nature, p. 187-203 17 p. (Studies in fuzziness and soft computing; vol. 194).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    5 Citations (Scopus)
  • Exponentiation

    Doche, C., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Boca Raton, Florida, USA: CRC Press, Taylor & Francis Group, p. 145-168 24 p. (Discrete mathematics and its applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Citations (Scopus)
  • Finite field arithmetic

    Doche, C., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Boca Raton, Florida, USA: CRC Press, Taylor & Francis Group, p. 201-237 37 p. (Discrete mathematics and its applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    5 Citations (Scopus)
  • From hubs via holons to an adaptive meta-architecture - The "AD-HOC" approach

    Maciaszek, L. A., 2006, Software Engineering Techniques: Design for Quality. Sacha, K. (ed.). New York, Vol. 227. p. 1-13 13 p. (IFIP International Federation for Information Processing; vol. 227).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Citations (Scopus)
  • Integer arithmetic

    Doche, C., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Boca Raton, Florida, USA: CRC Press, Taylor & Francis Group, p. 169-199 31 p. (Discrete mathematics and its applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Routing in extremely mobile networks

    Allard, G., Jacquet, P. & Mans, B., 2006, Challenges in ad hoc networking: Fourth Annual Mediterranean Ad Hoc Networking Workshop, June 21-24, 2005, Île de Porquerolles, France. Agha, K. AI., Lassous, I. G. & Pujolle, G. (eds.). New York: Springer, Springer Nature, p. 129-138 10 p. (IFIP International Federation for Information Processing; vol. 197).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • 2007

    A pattern enforcing compiler (PEC) for Java: a practical way to formally specify patterns

    Lovatt, H., Sloane, A. M. & Verity, D. R., 2007, Design pattern formalization techniques. Taibi, T. (ed.). Hershey, PA; London: IGI Publishing, p. 324-356 33 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • A unified taxonomy framework of trust

    Zhao, W., Varadharajan, V. & Bryan, G., 2007, Trust in e-services: technologies, practices and challenges. Song, R., Korba, L. & Yee, G. (eds.). Hershey, PA; London: IGI Global, p. 29-50 22 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Citations (Scopus)